General

  • Target

    2fbe9b55c293c3428a9cdf476ef094e1235e27cab28055aca0c5258840b03c4e.zip

  • Size

    288KB

  • Sample

    221114-lqpkpage67

  • MD5

    942c772bc9af5a262e28eca9e7b651a5

  • SHA1

    07874e572b14ff7e504ecc7004787ed21119f713

  • SHA256

    7e59a14ac2dbe85977f428fa328e3e9e05b351c4ae4433cf36fa2befed3eaba3

  • SHA512

    2301bdc03cb064fa2c8b1a8538098e1de71f17a1812fa240a201be1b2e25d4b2d1cf33102e3af998a42660158e428e6054a1854cbd989cc8615a788758029351

  • SSDEEP

    6144:j/Eg+3YZxoTT5hxGeuuIPKwUiiSF7yn+arWO6MhS6DzAUY7iwNWi10CpH:QX3OoTNKeu2eNzsQkTuWi+E

Malware Config

Extracted

Family

fickerstealer

C2

mistral3.xyz:80

Targets

    • Target

      2fbe9b55c293c3428a9cdf476ef094e1235e27cab28055aca0c5258840b03c4e.exe

    • Size

      507KB

    • MD5

      2a454ebe8ba40a5ea033f91307862f80

    • SHA1

      cc7f9ea6db6a44293bdd53dab6e032d2f8c0e742

    • SHA256

      2fbe9b55c293c3428a9cdf476ef094e1235e27cab28055aca0c5258840b03c4e

    • SHA512

      f31089da47211dd27c94a76f013f784c8549688260b239bc4c4d8605a3a5d3c334620458a0ebbc7214c9efaaa11ac4d778a3df4757d9a3ae28279b060d1fbe87

    • SSDEEP

      12288:andJLz2MxPWVMuySre8OL7TLpdk1EW0rF3:uLz2MVKeTLNdWy3

    • Fickerstealer

      Ficker is an infostealer written in Rust and ASM.

    • Looks up external IP address via web service

      Uses a legitimate IP lookup service to find the infected system's external IP.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks